A Tutorial of Mobile Ad-Hoc Network (Manet) Routing Protocols
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: In mobile adhoc network nodes dynamically forms networks, there is no any central infrastructure, thus routing becomes a very important issue. Routing protocols used in mobile ad hoc networks (MANET) must adapt to frequent or continual changes of topology, while simultaneously limiting the impact of following these changes on wireless resources. This paper presents a comprehensive report and a comparative study of the different MANET routing protocols. The performance of such communication between nodes depends on various protocols. we have tendency to survey variety of the recent analysis results in routing space. In the following sections we have a tendency to present various existing routing protocols with their merits and demerits
Authors and Affiliations
Palki Dhawan
To Propose Improvement in Probability based object tracking technique for Multiple Object Tracking
Abstract: The object tracking is the technique which is used to track object from the image or from the video. The video consists of multiple frames and in each frame location of that object had been predicted. To predic...
An Enhanced Authentication System Using Face and Fingerprint Technologies
Abstract: The primary aim of this paper is to develop an enhanced authentication system using a CascadedLink Feed-Forward Neural Networks. In the end, the system overcomes some limitations of face recognition and fingerp...
Electricity, Computers, Innovation, Environment and Capacity Building: A Statistical Review
Abstract : The objective was to examine the frameworks needed to foster innovations and to mobilize innovation towards co - creating computers in the context of developing countries’ challenge of unreliable energ...
Different Method Used in Pixel Value Differencing Algorithm
Steganography is the art of hiding information inside a multimedia. The basic idea is to hide data inside carrier medium such as text, image, audio, video and networks in such a way that attacker cannot detect it....
Classification Algorithms for Predicting Computer Science Students Study Duration
The Department of Computer Science Universitas Klabat offers a bachelor program in Computer Science which should be completed within eight semesters or four years. Some students can accomplish the course in less than fou...